Search

Auto-Authentication Techniques to Save Time and Improve CX

Consider Multi-Factor and Voice Biometrics to Improve Security

Auto authentication using multi-factor authentication and biometrics

Despite the appetite of contact centers and customers to use digital, human-free engagement channels, voice communications are still desired, necessary, and appropriate for some interactions. Interactions that are particularly complex or require multiple steps are still often best handled by human agents, rather than automated bots.

However, one of the key challenges faced by customers is the authentication process, which refers to the agent on the line ensuring that the person calling in is an authorized user for a specific service. This is important for most account-based relationships, but is particularly important for companies in the financial services, healthcare, hospitality, government, telecommunications, and other industries where personal or financial data is involved.

Typically, a telephone-based agent will ask a caller to verify specific information, including account numbers, the last four digits of their Social Security number, and, depending upon the organization and the sensitivity level of the account, some additional “challenge” questions that ostensibly only the owner of the account knows.

This creates additional friction, for several reasons. For one, answering these questions can take additional time, and for customers that are trying to get a problem or issue addressed, it can exacerbate their frustration. Further, due to the large number of accounts a person may have, it can be difficult to remember challenge questions and their answers, particularly if the customer set up the account months or years prior to the interaction. Some senior citizens may struggle with this type of authentication. Most frustratingly, to improve security often these same authentication questions are asked each time a customer is transferred to a new agent.

Another major concern with this type of information-based authentication is that it allows unauthorized users, such as account holders’ children, to access the account if they can provide this information. Fraudsters are also able to use this method of authentication to confirm information they may have stolen, or is available on the web, thereby providing them access to not only this account, but perhaps others, a consequence of people re-using usernames, passwords, and challenge questions across multiple accounts.

That is where moving to more advanced and secure processes for authenticating genuine users can reduce friction and provide greater security. One of the easiest ways to provide additional security is to employ multifactor authentication. In this case, once a user provides their authenticating information, such as a username, password, and answer to a challenge question, a text message with a one-time PIN will be sent to the mobile device number on file, which will then need to be provided to the agent to continue with the transaction. While this does not stop in-household users or bad actors who may have access to the mobile device from accessing the account, it does prevent fraudsters without the authenticating device to access the account.

Another more complex and robust solution is the use of voice biometrics to secure an account. Biometric authentication uses unique biological characteristics to verify an individual’s identity, and it is generally harder to spoof and more convenient for users, since they do not need to remember passwords, or carry a physical token than can be stolen or lost. Voice authentication is a biometric authentication technique that uses an analysis of a person’s voice to identify their identity. The shape and movement of a person’s mouth and jaw, combined with the individual shape and size of airways and other soft-tissue cavities, influence voice patterns to create voiceprint that is unique to each person. Moreover, recent research that tested voice recognition tools from VoiceVantage (a THC Technologies Corporation subsidiary), Verint, and Microsoft Azure, found that even identical twins’ voice biometrics are not identical, because, according to the research, “voice is just not mere words, it carries the emotional characteristics of the person at the moment of recording.”

Voice prints are made from reciting a specific text or passphrase, and this passphrase is spoken a few times to create a comprehensive sample. When a person uses the passphrase, certain words are compared with the stored voice print. Other systems do not rely on stored recordings, and instead are trained to recognize similarities between individuals’ voice patterns. Once this sample has been captured and enrolled, it is analyzed for unique vocal qualities, including duration, intensity, dynamics, and pitch, and is then templated to compare against future authentication attempts.

To ensure that recordings or synthetic voices are not used to fool the system, liveness detection, a technology that ensures that a voice sample being used is real, can be deployed. Another way to ensure that the user is legitimate is to utilize continuous authentication, which repeatedly verifies an individual’s identity over the length of a session, rather than just once.  

The key advantages of voice recognition include ubiquity, as all phones have microphones, and the process of speaking into the phone is convenient and familiar to most users. It also allows remote authentication and authentication through “smart” devices, such as appliances, so long as the device has mobile voice capabilities.

However, voice biometrics is not as accurate as say, face recognition, and is not suitable when there is a lot of background noise or when a speaker cannot talk at a normal volume (such as in a “quiet” commuter railcar.)

All told, voice biometrics should be considered as an additional security layer, rather than a standalone security solution. Even as the technology improves, the best defense against fraud is to utilize two or more low-friction security approaches to secure sensitive accounts and ensure the customer’s experience is positive.

Author Information

Keith has over 25 years of experience in research, marketing, and consulting-based fields.

He has authored in-depth reports and market forecast studies covering artificial intelligence, biometrics, data analytics, robotics, high performance computing, and quantum computing, with a specific focus on the use of these technologies within large enterprise organizations and SMBs. He has also established strong working relationships with the international technology vendor community and is a frequent speaker at industry conferences and events.

In his career as a financial and technology journalist he has written for national and trade publications, including BusinessWeek, CNBC.com, Investment Dealers’ Digest, The Red Herring, The Communications of the ACM, and Mobile Computing & Communications, among others.

He is a member of the Association of Independent Information Professionals (AIIP).

Keith holds dual Bachelor of Arts degrees in Magazine Journalism and Sociology from Syracuse University.

SHARE:

Latest Insights:

In a discussion that spans significant financial movements and strategic acquisitions to innovative product launches in cybersecurity, hosts Camberley Bates, Krista Macomber, and Steven Dickens share their insights on the current dynamics and future prospects of the industry.
The New ThinkCentre Desktops Are Powered by AMD Ryzen PRO 8000 Series Desktop Processors
Olivier Blanchard, Research Director at The Futurum Group, shares his insights about Lenovo’s decision to lean into on-device AI’s system improvement value proposition for the enterprise.
Steven Dickens, Vice President and Practice Lead, at The Futurum Group, provides his insights into IBM’s earnings and how the announcement of the HashiCorp acquisition is playing into continued growth for the company.

Latest Research:

In our latest Research Brief, The Case for Integrated Building Management: Achieving Operational Efficiency with Honeywell Enterprise Buildings Integrator, done in partnership with Honeywell, we analyze Honeywell’s EBI solution and how it addresses key customer pain points.
In this white paper, Operationalizing the Circular Economy: How HP is Reinventing Sustainability for the Tech Sector, you will learn the five fundamental challenges standing in the way of this transition, and how to address them.
Our latest research report, Endpoint Security Trends 2023, digs into modern attack techniques and how IT and security practitioners can most effectively respond and react, grounded in quantitative survey feedback.